Corporate Partners

Top IT Security Bloggers

  • Monday review - the hot 19 stories of the week

    Sophos - Naked Security
    Catch up with everything we wrote in the last seven days - it's weekly roundup time.
  • ZBOT-UPATRE Far From Game Over, Uses Random Headers

    Trend Micro - Security Intelligence
    TROJ_UPATRE, the most common malware threat distributed via spam, is known for downloading encrypted Gameover ZeuS onto affected systems. This ZeuS variant, in turn, is known for its use of peer-to-peer connections to its command-and-contol (C&C) servers.  This behavior has been known about since October 2013. We have observed that these specific ZeuS variants are now […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroZBOT-UPATRE Far From Game Over, Uses Random Headers
  • ZBOT-UPATRE Far From Game Over, Uses Random Headers

    TrendLabs - Malware Blog
    TROJ_UPATRE, the most common malware threat distributed via spam, is known for downloading encrypted Gameover ZeuS onto affected systems. This ZeuS variant, in turn, is known for its use of peer-to-peer connections to its command-and-contol (C&C) servers.  This behavior has been known about since October 2013. We have observed that these specific ZeuS variants are now […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroZBOT-UPATRE Far From Game Over, Uses Random Headers
  • Card Wash: Card Breaches at Car Washes

    Krebs on Security
    An investigation into a string of credit card breaches at dozens of car wash locations across the United States illustrates the challenges facing local law enforcement as they seek to connect the dots between cybercrime and local gang activity that increasingly cross multiple domestic and international borders.
  • British Gas Help Twitter account hacked, customers pointed towards phishing sites

    Graham Cluley
    Online criminals attempt to steal Twitter passwords by posting phishing messages from British Gas's support account.
  • Reuters website ‘hacked’ by the Syrian Electronic Army, but Taboola blamed for letting them in

    Graham Cluley
    The finger of suspicion points to Taboola, as visitors to the Reuters website were redirected by hackers.

    Find out more in my article for the Hot for Security blog.
  • Internet firm goes out of business after DDoS extortion attack

    Graham Cluley
    Blackmailers force internet site Code Spaces out of business, leaving customers in the lurch.

    Read more in my article on the We Live Security blog.
  • Privacy and iOS 8, USMS blunder and Cryptowall ransomware – 60 Sec Security [VIDEO]

    Sophos - Naked Security
    One minute of fun with a serious side...

    60 Second Security - 21 June 2014
  • The Code Spaces Nightmare

    Trend Micro - Cloud Security Blog
    Updated, 20-Jun @ 6:22pm To say that this continues to be a really bad week for the Code Spaces team is a massive understatement. After gaining access to their administrative credentials, an attacker managed to quickly and easily wipe out their entire business. Both production and backup data was destroyed. Steve Ragan has a great...
  • Endpoint security demands organizational changes

    Network World - Networking Nuggets and Security Snippets
    Pity endpoint security software. Venerable antivirus has gotten a bad reputation for being an ineffective commodity product. This situation is illustrated by some recently published ESG research (note: I am an employee of ESG). Security professionals working at enterprise organizations (i.e. more than 1,000 employees) were given a series of statements and asked whether they agreed or disagreed with each. The research revealed that:
    62% of respondents “strongly agreed” or “agreed” with the statement: “Endpoint security software is effective for detecting/blocking older types of malware but is not effective for detecting/blocking zero day and/or polymorphic malware commonly used for targeted attacks today.”
    52% of respondents “strongly agreed” or “agreed” with the statement: “Our continued use of traditional endpoint security software is driven by regulatory compliance requirements for the most part.”
    44% of respondents “strongly agreed” or “agreed” with the statement: “Endpoint security software is a commodity product with little measurable differences between brands.”

    Wow, it’s no wonder why some have declared that endpoint security software is “dead.” Negative opinions like these have put leading security firms like Kaspersky, McAfee, Sophos, Symantec, Trend Micro, and Webroot on the defensive and opened the door for endpoint antimalware upstarts like Bromium, Cisco/Sourcefire, Cylance, Crowdstrike, IBM, Invincea, Malwarebytes, and Triumfant.To read this article in full or to leave a comment, please click here

Market Place